Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published November 27, 2014 | Version v1
Journal article Open

KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS

  • 1. Department of Computer Science, University of Jordan, Amman, Jordan
  • 2. Deanship of e-learning, University of Dammam, Ad Dammam, KSA

Description

The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expected problems in one of these schemes.

Files

6614nsa05.pdf

Files (249.4 kB)

Name Size Download all
md5:772cb171c461abe05b47876ec1df0461
249.4 kB Preview Download